
Sec+ Quiz - 1
Authored by Isabella S
Computers
Professional Development
Used 34+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 2 pts
An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).
The hashing method
The encryption method
The registration authority
The certificate authority
The back-end directory source
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?
On-path
Domain hijacking
DNS poisoning
Evil twin
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?
Netstat
Ping
ssh
Ipconfig
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?
Lessons learned
Preparation
Detection
Containment
Root cause analysis
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether it is modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?
Check the hash of the installation file
Match the file names
Verify the URL download location
Verify the code-signing certificate
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?
Embedded Python code
Macro-enabled file
Bash scripting
Credential-harvesting website
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?
Snapshot
Differential
Cloud
Full
Incremental
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?